The year is 2020. You live a life so similar and yet very different from the one you lived a few years back. Cloud based technologies and ubiquitous internet connected devices have made life so much easier than it was in the past. You consume personalized content beamed directly onto specially crafted contact lenses by…

In late October, database-as-a-service provider MongoHQ became the victim of a spear-phishing attack that resulted in spam issues and possible data theft for many of its clients, including social media scheduler Buffer and iPhone calendar application Sunrise. Hackers successfully exploited porous network security, obtaining credentials that happened to be shared between different internal MongoHQ applications.

It may not be just you. Increasingly, it could be cybercriminals. As part of our regular quarterly review and analysis of malicious activity, in the third quarter of 2013 (July – September), we found that the problem of malware targeting online banking has gotten significantly worse. By the end of September our researchers detected over…

I left off the last blog, with the security capabilities to have on your cloud checklist to cover your operating system, network, apps and data in the cloud. The list doesn’t end there – one of the keys to successful security deployments is the ability to embed security into your cloud architecture and operational processes….

The cybersecurity community may need to come up with comprehensive new guidance about IT ethics. While technologies like cloud computing enable businesses, government agencies and security professionals to collect and process unprecedented amounts of data as part of their efforts to protect assets and provide better services, this power must be handled ethically and with care.

LinkedIn simultaneously impressed the technology industry and worried the cybersecurity community when it rolled out its groundbreaking LinkedIn Intro email service for iOS. Once installed, the new solution populates users’ iOS Mail apps with the LinkedIn profile information of anyone who contacts them.

Trend Micro was recently involved in assisting with an incident involving the website of the Office of the Prime Minister of Singapore. At first, it seemed that the website had been defaced by the well-known hacktivist collective Anonymous. On November 8, 2013 visitors to the site were reporting that they were seeing the image below….

Recently, Trend Micro received a request for information from Bits of Freedom that was sent to us and fourteen other security companies. Bits of Freedom asked four specific questions around our interactions with governments in regard to our detections of surveillance software. Let me first address these inquiries directly: 1. Have you ever detected the…

In my last blog, I walked through the shared responsibility model for security in the cloud and the importance of host-based firewalls to both inbound and outbound communication; intrusion prevention capabilities to protect against vulnerabilities even before you patch; integrity monitoring to catch system changes; and anti-malware with web reputation to protect against viruses and…

We recently reported that the number of malicious and high risk apps on the Android platform crossed the one million mark. It’s important to note that this beats by a full quarter our CTO Raimund Genes’ prediction from November 2012 that we would cross this mark by the end of 2013. Raimund took a few…